mirror of
https://github.com/Fishwaldo/linux-bl808.git
synced 2025-06-17 20:25:19 +00:00
usercopy: WARN() on slab cache usercopy region violations
This patch adds checking of usercopy cache whitelisting, and is modified from Brad Spengler/PaX Team's PAX_USERCOPY whitelisting code in the last public patch of grsecurity/PaX based on my understanding of the code. Changes or omissions from the original code are mine and don't reflect the original grsecurity/PaX code. The SLAB and SLUB allocators are modified to WARN() on all copy operations in which the kernel heap memory being modified falls outside of the cache's defined usercopy region. Based on an earlier patch from David Windsor. Cc: Christoph Lameter <cl@linux.com> Cc: Pekka Enberg <penberg@kernel.org> Cc: David Rientjes <rientjes@google.com> Cc: Joonsoo Kim <iamjoonsoo.kim@lge.com> Cc: Andrew Morton <akpm@linux-foundation.org> Cc: Laura Abbott <labbott@redhat.com> Cc: Ingo Molnar <mingo@kernel.org> Cc: Mark Rutland <mark.rutland@arm.com> Cc: linux-mm@kvack.org Cc: linux-xfs@vger.kernel.org Signed-off-by: Kees Cook <keescook@chromium.org>
This commit is contained in:
parent
8eb8284b41
commit
afcc90f862
4 changed files with 58 additions and 10 deletions
22
mm/slab.c
22
mm/slab.c
|
@ -4392,7 +4392,9 @@ module_init(slab_proc_init);
|
|||
|
||||
#ifdef CONFIG_HARDENED_USERCOPY
|
||||
/*
|
||||
* Rejects objects that are incorrectly sized.
|
||||
* Rejects incorrectly sized objects and objects that are to be copied
|
||||
* to/from userspace but do not fall entirely within the containing slab
|
||||
* cache's usercopy region.
|
||||
*
|
||||
* Returns NULL if check passes, otherwise const char * to name of cache
|
||||
* to indicate an error.
|
||||
|
@ -4412,10 +4414,24 @@ void __check_heap_object(const void *ptr, unsigned long n, struct page *page,
|
|||
/* Find offset within object. */
|
||||
offset = ptr - index_to_obj(cachep, page, objnr) - obj_offset(cachep);
|
||||
|
||||
/* Allow address range falling entirely within object size. */
|
||||
if (offset <= cachep->object_size && n <= cachep->object_size - offset)
|
||||
/* Allow address range falling entirely within usercopy region. */
|
||||
if (offset >= cachep->useroffset &&
|
||||
offset - cachep->useroffset <= cachep->usersize &&
|
||||
n <= cachep->useroffset - offset + cachep->usersize)
|
||||
return;
|
||||
|
||||
/*
|
||||
* If the copy is still within the allocated object, produce
|
||||
* a warning instead of rejecting the copy. This is intended
|
||||
* to be a temporary method to find any missing usercopy
|
||||
* whitelists.
|
||||
*/
|
||||
if (offset <= cachep->object_size &&
|
||||
n <= cachep->object_size - offset) {
|
||||
usercopy_warn("SLAB object", cachep->name, to_user, offset, n);
|
||||
return;
|
||||
}
|
||||
|
||||
usercopy_abort("SLAB object", cachep->name, to_user, offset, n);
|
||||
}
|
||||
#endif /* CONFIG_HARDENED_USERCOPY */
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue